181 |
Java performance of the Rijndael encryption algorithm across compilers and virtual machines /Orgill, Gregory Leavitt, January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. School ofTechnology, 2005. / Includes bibliographical references (p. 81-84).
|
182 |
Implementation of selected cryptographic algorithms on a reconfigurable microprocessor platform /Cook, Andrew L., January 2003 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2003. / Bibliography: leaves 99-106. Also available online.
|
183 |
Design of a flexible cryptographic hardware module /House, Andrew W. H., January 2004 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2004. / Bibliography: leaves 188-195.
|
184 |
Chaotic optical communications using delayed feedback systemsLocquet, Alexandre Daniel. January 2005 (has links)
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006. / Bertrand Boussert, Committee Member ; Douglas B. Williams, Committee Member ; William T. Rhodes, Committee Member ; Yves Berthelot, Committee Member ; David S. Citrin, Committee Chair.
|
185 |
Validation, delegation, and trust in inter-domain public key infrastructureGrindlinger, David Matthew. January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Includes vita. Includes bibliographical references.
|
186 |
Confidentiality and integrity in distributed data exchange /Miklau, Gerome. January 2005 (has links)
Thesis (Ph. D.)--University of Washington, 2005. / Vita. Includes bibliographical references (p. 132-142).
|
187 |
Implementation of a forward error correction technique using convolutional encoding with Viterbi decodingRawat, Sachin. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Title from PDF t.p. Includes bibliographical references (p. 90-91)
|
188 |
Symmetric private information retrieval via additive homomorphic probabilistic encryption /Lincoln, Laura Beth. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (p. 171-175).
|
189 |
Tracing faults in mobile ad hoc networks using symmetric authentication chainsHokanson, Eric J. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 26, 2006). Document formatted into pages; contains viii, 54 pages. Includes bibliographical references.
|
190 |
The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenariosCoetzee, Dirk Badenhorst 03 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to
broadcast the same collection of information to several receiving parties while only allowing
a certain subset of the receiving parties to access the information. This system must
still be secure in the scenario where all receiving parties who are not allowed access to the
information, pool their resources in an attempt to gain access to the information. Such a
product entitlement system must also be bandwidth e cient since it can be deployed in
networks where bandwidth is at a premium.
The foundations of modern encryption techniques is reviewed and a survey of existing
techniques, used to secure content in broadcast environments, is studied. From this
collection of techniques two were identi ed as bandwidth e cient and are discussed in
more detail before being implemented.
An attempt is then made to design a new secure bandwidth e cient encryption scheme
for protecting content in a broadcast environment. Several iterations of the design is detailed,
including the security aw which makes each design insecure. The nal design was
implemented and compared in several metrics to the two previously selected bandwidth
e cient schemes. A framework to test the correctness of the schemes over a network is
also designed and implemented.
Possible future avenues of research are identi ed with regards to creating a secure
broadcast encryption scheme and improving the software solution in which to use such a
scheme. / AFRIKAANSE OPSOMMING: 'n Veilige produk-aanspraak-stelsel stel een party, soos byvoorbeeld 'n betaal-TV-operateur,
in staat om dieselfde versameling inligting na verskeie partye uit te saai, terwyl slegs 'n
bepaalde deelversameling van die ontvangende partye toegelaat sal word om toegang tot
die inligting te bekom. Hierdie stelsel moet steeds die inligting beskerm in die geval waar
al die ontvangende partye wat toegang geweier word, hul hulpbronne saamsmee in 'n
poging om toegang te verkry. So 'n produk-aanspraak-stelsel moet ook bandwydte doeltre
end benut, aangesien dit gebruik kan word in netwerke waar bandwydte baie duur
is.
Die fondamente van die moderne enkripsietegnieke word hersien. 'n Opname van
bestaande tegnieke wat gebruik word om inligting te beskerm in 'n uitsaai omgewing
word bestudeer. Uit hierdie versameling tegnieke word twee geïdenti seer as tegnieke wat
bandwydte doeltre end benut en word meer volledig bespreek voordat dit geïmplementeer
word.
'n Poging word dan aangewend om 'n nuwe veilige bandwydte doeltre ende enkripsietegniek
te ontwerp vir die beskerming van inligting wat uitgesaai word. Verskeie iterasies
van die ontwerp word uiteengesit, met 'n bespreking van die sekuriteitsfout wat elke
ontwerp onveilig maak. Die nale ontwerp is geïmplementeer en aan die hand van verskeie
maatstawwe vergelyk met die twee bandwydte doeltre ende tegnieke, wat voorheen gekies
is. 'n Raamwerk om die korrektheid van die tegnieke oor 'n netwerk te toets, is ook ontwerp
en geïmplementeer.
Moontlike toekomstige rigtings van navorsing word geïdenti seer met betrekking tot
die skep van 'n veilige uitsaai enkripsietegniek en die verbetering van die sagtewareoplossing
wat so 'n tegniek gebruik.
|
Page generated in 0.1465 seconds